The Enemy Within (48 page)

Read The Enemy Within Online

Authors: Larry Bond

Tags: #Thriller

BOOK: The Enemy Within
2.9Mb size Format: txt, pdf, ePub

The computer expert smiled at the memory. “Geez, you should have read all the screaming about the sanctity of private electronic mail, and the First Amendment, and all the usual shit…”

“Hold it,” Thorn broke in, his mind racing in high gear. Two or three months ago? The timing could be coincidence, but he’d been wondering how the terrorists coordinated their attacks. Were they using computer hookups to communicate? He looked down at the younger man. “Are you saying someone has spotted coded messages coming from a foreign source to people here in the U.S.?”

“Yeah,” Kettler answered with a nonchalant shrug, “and as far as I’m concerned, they can put them in left-handed Swahili. I don’t give a rat’s ass. I’m just getting a kick seeing how loud all the Net prudes squawk about it.”

Thorn took a step closer and spoke slowly, intensely. “You’re missing the point. We’ve got terrorist attacks going on right and left, and now you’re telling me someone’s been intercepting coded messages?”

Kettler nodded, a little taken aback, but starting to understand.

“Yeah. But that’s not necessarily unusual. A lot of Email these days is
PEM
, privacy-enhanced E-mail. It’s just that these messages are using a real high level encryption program nobody’s ever heard of.” He shook his head. “Like I said, a bunch of us have been arguing the issue on some of the Net forums. It’s not general knowledge. Cripes, if CompuNet or any of the other public bulletin boards knew that someone was routinely breaking into their private message files, they’d have a conniption fit.”

Thorn cut him off sharply. “I don’t give a goddamn about the legalities, Mr. Kettler.” He leaned forward, towering over the openmouthed computer expert. “Do you know the person who’s been making those interceptions?”

“Only by his handle. He calls himself ‘Freebooter,’ ” Kettler replied hesitantly. “He’s a real top-gun hacker. He’s a little strange.”

Thorn didn’t say anything, though his mind reeled slightly at the thought that the computer expert could find anyone else odd.

Rossini joined in. “Can we contact this guy, Derek?”

“I can dial him up, I guess. I know where he usually hangs out in cyberspace.” Kettler absentmindedly scratched his beard. “Freebooter won’t talk to you directly, though, Maestro. You work for the Man.” He didn’t even mention Thorn.

“Whatever. Just do it.” Rossini almost pushed Kettler into his chair.

“Do you think he’ll be there?”

Kettler nodded, typing fast again. “Freebooter’s always there. He practically lives on the Net.”

The strange lines of machine code vanished as he shunted back to the
CPU
he had dedicated solely to monitoring the computer bulletin boards.

A speaker suddenly spat out a dial tone, followed by the sound of a number being punched in at high speed. The screen flickered and then blinked into another image. This one showed a rippling black flag emblazoned with a white skull and crossbones. Bold text letters spelled out:
WELCOME
TO
THE
PIRATES’
COVE
.

Kettler looked apologetic. “It’s a hacker’s
BBS
. I like to }eep my ear to the ground here… you know, just kind of see what’s new.” He bent over the keyboard again, fingers flashing through long-practiced combinations as he logged on and called up a list of those currently on-line. He leaned closer, scrolling through the names and then nodded sharply. “There he is!”

Thorn focused on the list and saw it. A line read:
FREEBOOTER
, IN
THE
TAVERN
.

The computer expert punched a few more keys and leaned back. “Okay, he’s chatting with someone else right now, but I just paged him.” “Good,” Thorn said simply. “Now, you know what we want?”

Kettler nodded rapidly. “Yeah. A data dump of every encrypted message he’s collected, right?”

“Right.”

“Okay,” Kettler said. “Listen, Lemme work on him for a while. This could be kinda tricky. Freebooter’s a touchy bastard. If we screw this up or he gets spooked, he’ll drop off the Net, change his handle, and then we’ll never find him.”

Thorn frowned. Despite Kettler’s demonstrated computer expertise, he was reluctant to trust something so important to someone so flaky. Still, he had to admit the bearded whiz kid knew a hell of a lot more about the strange subculture they were fishing in than he did. He nodded. “All right, Mr. Kettler.~We’ll do it your way. You reel him in.”

Kettler hesitated. “There’s just one more thing.”

“Yes?”

“This guy won’t do shit for free, Colonel Thorn. He lives on secret knowledge. It turns him on. Makes him feel good. Know what I mean?”

Thorn nodded. He’d seen others in the intelligence game with the same compulsion.

“So we’ve got to offer him something,” Kettler continued. “Trade stuff he’d be interested in for those message files.”

Thorn nodded again. He thought fast. “Does Freebooter usually blab his secrets? Or try to sell them?”

“No.” Kettler shook his head. “At least, I don’t think so. I think he only started posting stuff about the codes because he got so frustrated that he couldn’t crack them. He even dropped out of the Net debate once he realised no one there had the kind of decryption software he needed.”

“Fine. Then you offer him what we just learned about the Midwest Telephone virus. The Bulgarian connection. The fact that we now suspect the terrorist campaign is under foreign control. The whole bit. You emphasise that it’s knowledge that only a very few people in the U.S. government possess. And you promise a first look at whatever our codebreakers come up with if they can crack those messages. Think that’ll make him bite?”

Thorn carefully avoided locking at Rossini as he spoke. What he was proposing was a massive breach of security. But damn it, they needed those message files. Trying to track them down on their own would take too much time.

Kettler nodded slowly, thinking it through. “Yeah. That might do it. Freebooter knows I’ve got some Pentagon connections.”

He sat upright as text began appearing on his display. “Here we go. He’s answering my page.” His hands came down again over the keyboard.

Thorn felt Rossini’s touch on his arm and stepped back. Nothing more would be served by crowding Kettler now. Strange as it might seem, he would have to rely on the oddball computer expert who was busy wheeling and dealing over the ether to acquire illegally obtained information from an electronic Peeping Tom. It was an uncomfortable, if unavoidable, position.

The time dragged by, punctuated only by a steady clicking as Kenler typed in offers and responded to counteroffers.

Thorn paced impatiently, matched almost step for step by Rossini. His mind whirled with the information that might be contained in those encrypted messages. Proof that a foreign government was behind this wave of terror. The hiding places and plans of the separate terrorist cells. A target.

That was what he wanted. What the whole country needed. Something or someone to focus their anger on, to strike back at to destroy. Knowing their enemy would change everything. Maybe.

“Got it!”

Thorn’s head snapped up at Kettler’s triumphant cry. He crossed to the computer expert’s side in two long strides. `’Where?”

“There.” Kettler pointed to the blinking red light on one of his machines indicating a hard drive in operation. “I’m downloading Freebooter’s files now. Shouldn’t take more than another minute.”

This time Thorn stood impatiently by, waiting for Kettler to pull up a directory of the files he’d just received. There were more than a hundred of them, some dating back to early October when the mysterious Freebooter had first stumbled across them. Others were more recent.

“Pull that one up,” he ordered, pointing almost at random.

“Right.” Kettler complied swiftly, his own curiosity now clearly engaged.

All three men stared at the message that popped onto the display.

From: [email protected]
NOV
22 00:15:35
GMT
Received: from sub-ingul~by by relay7(comnet.com) with
SMPT
(234.281 778/M8) id AA 314935146;
NOV
22 00:15:35
GMT
Text follows:

_ _ *

The main body of the message was an indecipherable hash of numbers, letters, and characters.

“Go to another,” Thorn commanded. He barely noticed Rossini pulling in chairs so that they could all sit grouped around the monitor as Kettler began dancing through the encrypted messages first at random and then in chronological order.

Even a cursory check of the time/date stamp each message contained began to reveal a distinct pattern. Communications from a single, unidentified, foreign source, “Magi,” were being sent to at least ten separate users in the United States. And those users communicated only with Magi never with each other. More damning still, there appeared to be a rough correlation between the messages from Magi, the deadliest terrorist attacks, and the messages back to Magi.

Thorn felt his pulse starting to accelerate. To his trained eye, the sequence was a familiar one: operations orders and postaction damage assessment reports. He felt the strange elation of seeing a long-sought enemy moving into his sights. He was willing to stake his career on the belief that he and Rossini had found the communications network the terrorists were using to conduct their campaign.

CHAPTER
20.
TRACKING
.

DECEMBER
2

Andrews Air Force Base, near Washington D.C.

With its navigation lights blinking steadily, an Air Force C20 Gulfstream slid down out of the night sky onto a floodlit runway. Slowing, the aircraft rolled past the control tower and darkened hangar buildings and stopped near a group of vehicles at the far end of the field.

Without ceremony, Major General Sam Farrell emerged from the transport plane, followed by several members of his staff.

Colonel Peter Thorn stepped forward to meet him at the foot of the stairs and saluted.

The head of the
JSOC
snapped a return salute and shook hands with him.

“How’s it going, Pete?”

“Better, sir.”

Farrell nodded. “You have those encrypted messages ready to go?”

“Yes, sir.” Thorn handed him a computer diskette. “They’re all on that.”

The general handed the disk off to a young captain. “On your way, John. Download ‘em to Fort Meade on a secure line. You know the number.”

“Sir.” The captain headed toward one of the waiting cars.

Farrell turned back to Thorn. “After I got your fax, I got on the horn with the NSA’s deputy director of operations. His people are eager to see if they can crack these mystery messages of yours.”

Thorn nodded his understanding. The National Security Agency was responsible for cryptanalysts and codebreaking. Access to its trained experts and supercomputers was essential. From what Kettler had said, only the
NSA
had a chance at turning the gobbledygook on that diskette into readable text. If it contained anything worth reading, that is.

“This could still be just a blind alley, sir,” he warned quietly.

Farrell shook his head. “I doubt it.” The taller man put a hand on Thorn’s shoulder. “You’re one of my best officers, Pete. I trust your instincts and judgment. That’s why I’m here instead of still down at Pope. If you’re right, this damned situation could start breaking open fast. And I want to be in a position where I can talk some sense into the Chiefs if the balloon goes up.”

Paced by Thorn and his staff, the general strode toward the vehicles waiting to take him to the Pentagon. “You ready to take this discovery of yours to the
FBI
task force?”

“Yes, sir. I have an appointment with Mike Flynn early tomorrow.”

“Good.” Farrell lowered his voice. “Be persuasive, Pete. The Bureau’s bound to be pissed-off if they think we’re muscling in on their turf. Make it clear that we know this investigation is still in their bailiwick.”

“Understood, sir,” Thorn said, hoping he could pull that off. Diplomacy had never been his strong suit. “I’ll do my level best.”

Tehran

(D
MINUS
13)

General Amir Taleh listened with satisfaction to the brief assembled by his staff. Despite a natural caution that had served him so well for so long, he had to admit to himself that his intricately designed plan was working perfectly holding precisely to its preset schedule. The short video montage his officers had assembled from American news broadcasts summed up the situation in a few dramatic pictures.

Shots of burning buildings, troops moving in armored vehicles down city streets, and rows of bodies in makeshift morgues were telling evidence of his special operatives’ efficiency. In effect, the pictures of soldiers moving through civilian neighborhoods told the whole story. America’s police were no longer able to keep order without help from their National Guard. Soon, he thought coldly, even they would not be enough.

His gaze turned from the television screen to the small staff grouped in front of his desk. These men were his closest intimates the only men in Iran he trusted with full knowledge of his plans.

“Are you satisfied that we are ready to begin Phase IV of SCIMITAR?” Taleh asked quietly.

His question was largely a formality. The tight movement schedules needed to bring his forces into place at the proper moment required an intricate juggling of Iran’s transportation resources its trucks, trains, and ships. Unnecessary delay at this point might throw the whole operation out of kilter. Nonetheless, nothing could begin without Taleh’s express authorization. He had taken great pains to ensure that all the strands of military power ran through his hands and his hands alone.

His senior operations officer, an elderly, precise man, now deaf. “We are ready. Our meteorological reports also indicate a patch of bad weather coming in, which we may be able to use to our advantage.”

“Excellent,” Taleh replied. Their troop movements had all been timed to avoid American reconnaissance satellites as much as possible, but cloud cover would simplify matters. Truly, God was showing his favor to the Faithful.

Other books

Jenny's War by Margaret Dickinson
Java Spider by Geoffrey Archer
Ghost Time by Eldridge, Courtney
A Lady's Pleasure by Robin Schone
Jack & Louisa: Act 1 by Andrew Keenan-bolger, Kate Wetherhead
A War of Gifts by Orson Scott Card